Dataset Viewer
content
stringlengths 26
2.54k
| metadata
dict |
---|---|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
(GECC – 1: 2023)
TLP: White
Document Classification: Public
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 0,
"page_label": "1",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
2 Document Classification: Public TLP: White
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 1,
"page_label": "2",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
3 Document Classification: Public TLP: White
Disclaimer: This Guide has been developed by the National Cybersecurity Authority (NCA)
to enable organization to implement the Essential Cybersecurity Controls (ECC).
Organizations must not rely solely on this guide to implement the ECC . They need to take
into account the unique requirements of the ir organization and its environment. The NCA
confirms that this document is only a guide that can be used as an illustrative model and does
not necessarily mean that this is the only method of implem enting the ECC, provided that
other methods do not conflict with the requirements of the NCA
This document contains
some illustrative deliverables related to the ECC implementation. The assessor/auditor has the
right to request other evidence as deemed necessary to ensure that all requirements in the ECC
are implemented.
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 2,
"page_label": "3",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
4 Document Classification: Public TLP: White
In the Name of Allah,
The Most Gracious,
The Most Merciful
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 3,
"page_label": "4",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
5 Document Classification: Public TLP: White
Traffic Light Protocol (TLP):
This marking protocol is widely used around the world. It has four colors (traffic lights):
Red – Personal, Confidential, and for the Intended Recipient
Only
The recipient has no rights to share information classified in red with any
person outside the defined range of recipients, either inside or outside the
organization.
Amber – Restricted Sharing
The recipient may share information classified in orange only with intended
recipients inside the organization and with recipients who are required to take
action related to the shared information.
Green – Sharing within the Same Community
The recipient may share information classified in green with other recipients
inside the organization or outside it within the same sector or related to the
organization. However, it is not allowed to exchange or p ublish this
information on public channels.
White – No Restriction
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 4,
"page_label": "5",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
6 Document Classification: Public TLP: White
Table of Contents
Introduction ................................................................................................................................................................7
Objective ......................................................................................................................................................................7
Scope of Work .............................................................................................................................................................7
ECC Domains and Structure ....................................................................................................................................8
Guide Structure ...........................................................................................................................................................9
ECC Implementation Guidelines .......................................................................................................................... 10
List of the Figures
FIGURE 1
ECC DOMAINS AND SUBDOMAINS ........................................................................................................... 8
FIGURE 2: ECC STRUCTURE ....................................................................................................................................... 9
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 5,
"page_label": "6",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
7 Document Classification: Public TLP: White
Introduction
The National Cybersecurity Authority (referred to in this document as
developed this guide for implementing the Essential Cybersecurity Controls (ECC
1: 2018),
to aid national organizations in implementing the requirements that are necessary to comply
with the ECC. This guide was developed based on the information and experiences that NCA
collected and analyzed since the publication of the ECC and is aligned with cybersecurity best
practices to facilitate the implementation of the controls across national organizations.
Objective
The main objective of this guide is to enable and aid national organizations in
implementing the necessary and applicable E CC requirements that are needed for their
compliance with the ECC, in addition to strengthening their cybersecurity posture, and
reducing cybersecurity risks that may arise from internal and external cyber threats.
Scope of Work
This guide's scope of work is the same as the (ECC-1:2018): These controls are
applicable to government organizations in the Kingdom of Saudi Arabia (including ministries,
authorities, establishments, and others) and their companies and entities, as well a s private
sector organizations owning, operating, or hosting Critical National Infrastructures (CNIs),
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 6,
"page_label": "7",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-1 استراتيجية الأمن السيبراني
Cybersecurity Strategy
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-2 إدارة الأمن السيبراني
Cybersecurity Management
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-3 سياسات وإجراءات الأمن السيبراني
Cybersecurity Policies and Procedures
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-4 أدوار ومسؤوليات الأمن السيبراني
Cybersecurity Roles and
Responsibilities
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-5 إدارة مخاطر الأمن السيبراني
Cybersecurity Risk Management
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-6
الأمن السيبراني ضمن إدارة المشاريع
المعلوماتية والتقنية
Cybersecurity in Information
Technology Projects
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-7 الالتزام بتشريعات وتنظيمات ومعايير الأمن
السيبراني
Cybersecurity Regulatory Compliance
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-8 المراجعة والتدقيق الدوري للأمن السيبراني
Periodical Cybersecurity Review and
Audit
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-9 الأمن السيبراني المتعلق بالموارد البشرية
Cybersecurity in Human Resources
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-10 برنامج التوعية والتدريب بالأمن السيبراني
Cybersecurity Awareness and Training
Program
2 تعزيز الأمن السيبراني
Cybersecurity Defense
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-1 إدارة الأصول
Asset Management
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-2 إدارة هويات الدخول والصلاحيات
Identity and Access Management
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-3 حماية الأنظمة وأجهزة معالجة المعلومات
Information System and Processing
Facilities Protection
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-4 حماية البريد الإلكتروني
Email Protection
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-5 إدارة أمن الشبكات
Networks Security Management
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-6 أمن الأجهزة المحمولة
Mobile Devices Security
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-7 حماية البيانات والمعلومات
Data and Information Protection
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-8 التشفير
Cryptography
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-9 إدارة النسخ الاحتياطية
Backup and Recovery Management
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-10 إدارة الثغرات
Vulnerability Management
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-11 اختبار الاختراق
Penetration Testing
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-12 إدارة سجلات الأحداث ومراقبة الأمن السيبراني
Cybersecurity Event Logs and
Monitoring Management
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-13 إدارة حوادث وتهديدات الأمن السيبراني
Cybersecurity Incident and Threat
management
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-14 الأمن المادي
Physical Security
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-15 حماية تطبيقات الويب
Web Application Security
3 صمود الأمن السيبراني
Cybersecurity Resilience
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
3-1 جوانب صمود الأمن السيبراني في إدارة استمرارية الأعمال
Cybersecurity Resilience Aspects of Business Continuity Management (BCM)
4
الأمن السيبراني المتعلق
بالأطراف الخارجية والحوسبة
السحابية
Third-Party and Cloud
Computing Cybersecurity
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
4-1 الأمن السيبراني المتعلق بالأطراف الخارجية
Third-Party Cybersecurity
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
4-2
الأمن السيبراني المتعلق بالحوسبة السحابية
والاستضافة
Cloud Computing and Hosting
Cybersecurity
5 الأمن السيبراني لأنظمة التحكم
الصناعي
ICS Cybersecurity
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
5-1 حماية أجهزة وأنظمة التحكم الصناعي
Industrial Control Systems (ICS) Protection
FIGURE 1: ECC DOMAINS AND SUBDOMAINS
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
9 Document Classification: Public TLP: White
Guide Structure
Name of Main Domain Reference number of the Main Domain
Reference No. of the Subdomain Name of Subdomain
Objective
Controls
Control Reference No. Control Clauses
Relevant cybersecurity tools:
Control implementation guidelines:
Expected deliverables:
FIGURE 2: ECC STRUCTURE
1
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 8,
"page_label": "9",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-1 Cybersecurity Strategy
Objective To ensure that cybersecurity plans, goals, initiatives and projects are contributing to
compliance with related laws and regulations.
Controls
1-1-1 A cybersecurity strategy must be defined, documented and approved. It must be
supported by the head of the organization or his/her delegate (refer red to in this
document as Authorizing Official). The strategy goals must be in -line with related
laws and regulations.
Relevant cybersecurity tools:
• All cybersecurity strategy models and roadmap
Control implementation guidelines:
• Conduct a workshop with stakeholders in the organization to align the
objectives of the cybersecurity strategy with the organization's strategic
objectives.
• Develop and document cybersecurity the strategy of the organization in order
to align the organization's cybersecurity strategic objectives with related laws
and regulations, including but not limited to (CCC, CSCC). A cybersecurity
strategy often includes the following:
o Vision
o Mission
o Strategic Objectives
o Strategy Implementation Plan
o Projects
o Initiatives
• In order for the cybersecurity strategy of the organization to be effective, the
approval of the representative must be based on the authority matrix
approved by the organization
Expected deliverables:
Cybersecurity Governance
1
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 9,
"page_label": "10",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
11 Document Classification: Public TLP: White
• The cybersecurity strategy document approved by the organization
(electronic copy or official hard copy).
• Initiatives and projects included in the cybersecurity strategy of the
organization.
1-1-2 A roadmap must be executed to implement the cybersecurity strategy.
Relevant cybersecurity tools
• All cybersecurity strategy models and roadmap.
• Cybersecurity performance report and measurement template.
Control implementation guidelines
• Develop a roadmap for implementing the cybersecurity strategy including the
execution of the strategy's initiatives and projects to:
o Define cybersecurity priorities.
o Make recommendations related to cybersecurity works in the
organization in a manner consistent with the nature of its work.
o Monitor the implementation of cybersecurity strategy projects and
initiatives and take corrective steps if necessary.
o Ensure the implementation of initiatives and projects according to
requirements.
o Provide a clear and unified vi sion and communicate it to all internal
and external stakeholders.
o Obtain NCA's approval for any cybersecurity initiatives that are
beyond the scope of the organization.
Expected deliverables
• Strategy implementation roadmap
• List of cybersecurity projects and initiatives and their status
1-1-3 The cybersecurity strategy must be reviewed periodically according to planned
intervals or upon changes to related laws and regulations.
Control implementation guidelines:
• Review and update the cybersecurity strategy periodically according to a
documented and approved review plan as follows
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 10,
"page_label": "11",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-2 Cybersecurity Management
Objective
cybersecurity programs within the organization as per related laws and regulations
Controls
1-2-1 A dedicated cybersecurity function (e.g., division, department) must be established
within the organization. This function must be independent from the Information
Technology/Information Communication and Technology (IT/ICT) functions (as
per the Royal Decree number 37140 dated 14/8/1438H). It is highly recommended
that this cybersecurity function reports directly to the head of the organization or
his/her delegate while ensuring that this does not result in a conflict of interest.
Relevant cybersecurity tools
• Cybersecurity Function Organizational Structure
• Cybersecurity Roles and Responsibilities Template
• Cybersecurity General Policy Template
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 11,
"page_label": "12",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
13 Document Classification: Public TLP: White
Control implementation guidelines:
• Establish a cybersecurity function within the organization to enable it to carry
out its cybersecurity tasks as required, taking into account the following
points
o Ensure that the cybersecurity function's reporting line is different from
that of the IT department or the digital transformation department, as
per Royal Decree No. 37140 dated 14/8/1438H
o Ensure that the cybersecurity function is reporting to the head of the
organization or his/ her deputy/ assistant for the sectors concerned
with regulation, including but not limited to, deputy/ assistant head of
business sectors or regulatory sectors, or the agents and heads of
business sectors in the organization
o Ensure the following in order to avoid conflict of interest
o The cybersecurity function is responsible for all cybersecurity
monitoring activities (including compliance mo nitoring,
operation monitoring, operations, etc.)
o The cybersecurity function is responsible for all cybersecurity
governance activities (including defining cybersecurity
requirements, managing cybersecurity risks, etc.)
Expected deliverables
• The organization's organizational structure (electronic copy or official hard
copy), covering the organizational structure of the cybersecurity function.
• The decision to establish the Cybersecurity functions and its mandate
(electronic copy or official hard copy)
• Reports on the cybersecurity policies compliance results
1-2-2 The position of cybersecurity function head (e.g., CISO), and related supervisory and
critical positions within the function, must be filled with full -time and experienced
Saudi cybersecurity professionals.
Control implementation guidelines:
• Appoint full-time and highly qualified Saudi cybersecurity professionals to fill
the following job roles and positions
o Head of the cybersecurity function, who is responsible for leading the
cybersecurity operations within the organization, setting the vision
and direction for cybersecurity, strategies, resources and related
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 12,
"page_label": "13",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
14 Document Classification: Public TLP: White
activities, and providing insights to the organiz ation's leadership
regarding effective cybersecurity risk management methods for the
organization.
o Supervisory positions within the cybersecurity function (e.g.,
managers of departments and functions within the cybersecurity
function as per the organizatio nal structure and/or the cybersecurity
function governance and operating model approved by the
authorization official), and in case there is a vacancy for any
supervisory position, an employee is to be assigned to run the
operations of the function or depa rtment until the supervisory
position is filled as per an approved timeline.
o Critical roles within the cybersecurity function that include
responsibilities requiring confidentiality and integrity where if not
performed as required, it would have negative i mpacts on the
cybersecurity of the organization, its operations, and its systems while
also considering the national laws and regulations related to
nationalizing the cybersecurity positions within the organization,
including direct or indirect employees and contractors (including, but
not limited to, royal orders and decrees, orders issued by the Council
of Ministers, and official circulars and regulatory orders issued by the
National Cybersecurity Authority). The Saudi Cybersecurity
Workforce Framework (S CyWF) can be utilized as reference
regarding the job positions related to cybersecurity.
• Define the required academic qualifications and years of experience to serve
as the head of the cybersecurity function and the supervisory and critical job
roles and positions. For example, but not limited to:
o Developing a job description of the head of the cybersecurity function
position to include the minimum required number of years of
experience and related fields, and the appropriate academic
qualifications, and appropriate training and professional certificates in
the cybersecurity and technical fields relying on The Saudi
Cybersecurity Workforce Framework (SCyWF)
Expected deliverables:
• A detailed list of all personnel (direct or indirect employees and contractors),
whose work is related to cybersecurity, that includes names, nationality,
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 13,
"page_label": "14",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
15 Document Classification: Public TLP: White
contractual type, position titles, job roles, years of experience, academic and
professional qualifications.
• Job descriptions of the head of the cybersecurity and the supervisory and
critical positions related to cybersecurity relying on The Saudi Cybersecurity
Workforce Framework (SCyWF).
1-2-3 A cybersecurity steering committee must be established by the Authorizing Official
to ensure the support and implementation of the cybersecurity programs and
initiatives within the organization. Committee members, roles and responsibilities,
and governance framework must be defined, documented and approved. The
committee must include the head of the cybersecurity function as one of its members.
It is highly recommended that the committee reports directly to the head of the
organization or his/her delegate while ensuring that this does not result in a conflict
of interest.
Relevant cybersecurity tools
• Cybersecurity supervisory committee governance document template
Control implementation guidelines:
• Establish the cybersecurity supervisory committee as a committee specialized
in directing and leading cybersecurity affairs, processes, programs, and
initiatives in the organization. The committee's must be directly reporting to
the organization's head or his/ her deput y, taking into account non -conflict
of interests
• Identify the members of the supervisory committee, where the cybersecurity
supervisory committee includes members who influence or are influenced by
the cybersecurity of the organization. Such members inclu de but are not
limited to, the head of the organization or his/ her deputy, the head of the
cybersecurity function, the head of the IT department, the head of the
Compliance Department, the Head of the Human Resources Department. In
addition, define the du ties and responsibilities of the supervisory committee
and its business governance framework, and formally document them in the
Committee's Charter. The Committee's charter must be approved by the
organization's representative (head of organization or his/ her deputy)
• Include the head of cybersecurity function as a permanent member of the
committee
• Conduct periodic meetings (based on the intervals specified in the
committee's charter document). The periodic meetings cover ensuring follow-
up on the impleme ntation of cybersecurity programs and regulations in the
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 14,
"page_label": "15",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-3 Cybersecurity Policies and Procedures
Objective
To ensure that cybersecurity requirements are documented, communicated and
complied with by the organization as per related laws and regulations, and
organizational requirements.
Controls
1-3-1 Cybersecurity policies and procedures must be defined and documented by the
cybersecurity function, approved by the Authorizing Official, and disseminated to
relevant parties inside and outside the organization.
Relevant cybersecurity tools
• All policies, procedures, and standard controls templates included within
cybersecurity toolkit
Control implementation guidelines:
• Define and document cybersecurity requirements in cybersecurity policies,
procedures, and standard controls, and approve them by the organization's
representative based on the authority matrix approved by the organization
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 15,
"page_label": "16",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
17 Document Classification: Public TLP: White
• Ensure the communication of policies and procedures to the organization's
personnel and internal and external stakeholders. Such communication must
be done through the approved comm unication channels as per the scope
specified in the policy ( e.g., publishing policies and procedures through the
organization's internal portal, or publishing policies and procedures by e -
mail)
Expected deliverables
• All cybersecurity policies, procedures, and standard controls documented
and approved by the organization's representative or his/ her deputy
• Communicate cybersecurity policies, procedures, and standard controls to
personnel and stakeholders
1-3-2 The cybersecurity function must ensure that the cybersecurity policies and procedures
are implemented.
Relevant cybersecurity tools
• A template of personnel acknowledgment and approval to follow the
cybersecurity policies
• A template of personnel acknowledgment and approval to maintain
information confidentiality
Control implementation guidelines:
• Develop an action plan to implement cybersecurity policies, procedures, and
standard controls . Such plan must include all internal and external
stakeholders, to whom the organization's policies, procedures, and standard
controls apply. Such stakeholders must be followed - up and monitored
periodically to ensure the full and effective implementation of all
requirements
• The cybersecurity function must ensu re the implementation of cybersecurity
controls and adherence to the approved and documented cybersecurity
policies, procedures, and standard controls
• Ensure the implementation of cybersecurity policies, procedures, and
standard controls , including controls and requirements, manually or
electronically (automated)
Expected deliverables
• An action plan to implement the cybersecurity policies and procedures of
the organization
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 16,
"page_label": "17",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
18 Document Classification: Public TLP: White
• A report that outlines the review of the implementation of cybersecurity
policies and procedures
1-3-3 The cybersecurity policies and procedures must be supported by technical security
standards (e.g., operating systems, databases and firewall technical security
standards).
Relevant cybersecurity tools
• A template of all standard controls included in cybersecurity tools.
Control implementation guidelines:
• Define, document, and approve technical standard controls to cover the
organization's information and technology assets (e.g., firewall technical
security standard controls , network devi ces, databases, server operating
systems, BYOD operating systems, secure development standard,
cryptography standard, etc.).
• Communicate the technical standard controls to the relevant departments in
the organization ( e.g., IT department) and ensure that they are applied
periodically to information and technology assets
Expected deliverables
• The organization's approved technical cybersecurity standard controls
documents
1-3-4 The cybersecurity policies and procedures must be reviewed periodically according to
planned intervals or upon changes to related laws and regulations. Changes and
reviews must be approved and documented.
Control implementation guidelines:
• Review the cybersecurity policies, procedures, and standard controls in the
organization periodically according to a documented and approved plan for
review and based on a period specified in the policy (e.g., periodic review must
be conducted annually)
• Review and update the cybersecurity policies, procedures, and standard
controls in the organization in the event of changes in the relevant laws and
regulations (for example, when a new cybersecurity law is issued that applies
to the organization).
• Document the review and changes to the cybersecurity policies, procedures,
and standard controls and approve them by the head of the organization or
his/her deputy
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 17,
"page_label": "18",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-4 Cybersecurity Roles and Responsibilities
Objective To ensure that roles and responsibilities are defined for all parties participating in
implementing the cybersecurity controls within the organization.
Controls
1-4-1 Cybersecurity organizational structure and related roles and responsibilities must be
defined, documented, approved, supported and assigned by the Authorizing Official
while ensuring that this does not result in a conflict of interest.
Relevant cybersecurity tools
• Cybersecurity Roles and Responsibilities Template
Control implementation guidelines:
• Define and document cybersecurity roles and responsibilities and inform and
ensure all parties involved in the implementation of cybersecurity controls at
the organization of their responsibilit ies in implementing cybersecurity
programs and requirements
• Support the organizational structure, roles, and responsibilities of the
organization by the executive management
This must be done through the
approval of the representative
• Include the following roles and responsibilities (but not limited to)
o Roles and responsibilities related to the cybersecurity supervisory
committee
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 18,
"page_label": "19",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
20 Document Classification: Public TLP: White
o Roles and responsibilities related to the head of the cybersecurity
function
o Roles and responsibilities related to t he cybersecurity function ( e.g.,
develop and update cybersecurity policies and standard controls ,
conduct cybersecurity risk assessment, conduct compliance checks on
cybersecurity policies and legislation, monitor cybersecurity events,
assess vulnerabiliti es, manage access, develop and implement
cybersecurity awareness programs, etc.)
o Roles and responsibilities related to cybersecurity for other
departments in the organization (e.g., IT, personnel, physical security,
etc.)
o Cybersecurity roles and responsibilities for all personnel
• Assign roles and responsibilities to the organization's personnel, taking into
consideration the non-conflict of interests
Expected deliverables:
• Cybersecurity Function Organizational Structure Document
• The organization's approved cybersecurity roles and responsibilities
document (electronic copy or official hard copy)
• A document that clarifies the assignment of cybersecurity roles and
responsibilities to the organization's personnel
1-4-2 The cybersecurity roles and responsibilities must be reviewed periodically according
to planned intervals or upon changes to related laws and regulations.
Control implementation guidelines
• Review the cybersecurity roles and responsibilities in the organization
periodically according to a documented and approved plan for review and
based on a planned interval ( e.g., periodic review must be conducted
annually)
• Review and update the cybersecurity roles and responsibilities in the
organization in the event of changes in the relevant laws and regulations (for
example, when a new cybersecurity law is issued that applies to the
organization)
• Document the review and changes to the cybersecurity requirements related
to cybersecurity roles and responsibilities and appro ve them by the
representative
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 19,
"page_label": "20",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-5 Cybersecurity Risk Management
Objective
To ensure managing cybersecurity risks in a methodological approach in order to
protect the
policies and procedures, and related laws and regulations.
Controls
1-5-1 Cybersecurity risk management methodology and procedures must be defined,
documented and approved as per confidentiality, integrity and availability
considerations of information and technology assets.
Relevant cybersecurity tools
• Cybersecurity Risk Management Policy Template.
• Cybersecurity Risk Management Procedures Template.
Control implementation guidelines:
• Define and document cybersecurity risk management requirements which
are based on relevant regulations, best practices, and standard controls of
cybersecurity risk management, taking into account the confidentiality,
availability, and integrity of information and technology assets to cover the
following
o The methodology and procedures of cybersecurity risk management in
the organization must include
- Identification of assets and their value
- Identification of risks to the business, assets, or personnel of
the organization
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 20,
"page_label": "21",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
22 Document Classification: Public TLP: White
- Risk assessment, so that the likelihood and impact of the
identified risks are defined
- Risk response, where cyber risk treatment methods are
identified
- Risk monitoring, so that the risk register is updated after each
risk assessment and response plan
• Support the cybersecurity risk management methodology and procedures in
the organization by the Executive Management through the approval of the
representative
Expected deliverables
• The approved cybersecurity risk management methodology (electronic copy
or official hard copy)
• Approved cybersecurity risk management procedures
1-5-2 The cybersecurity risk management methodology and procedures must be
implemented by the cybersecurity function.
Relevant cybersecurity tools
• Cybersecurity Risk Management Register Template
Control implementation guidelines:
• Implement all requirements of the cybersecurity risk management
methodology and procedures adopted by the organization
• Establish a cybersecurity risk register to document and monitor risks
• Develop plans to address cybersecurity risks of the organization
Expected deliverables
• Cybersecurity Risk Register of the organization
• Cybersecurity Risk Treatment Plan of the organization
• A report that outlines the cybersecurity risk assessment and monitoring
1-5-3 The cybersecurity risk assessment procedures must be implemented at least in the
following cases:
1-5-3-1 Early stages of technology projects.
Control implementation guidelines:
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 21,
"page_label": "22",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
23 Document Classification: Public TLP: White
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Include cybersecurity requirements within the first phase of the information
and technology projects lifecycle (Technical Project Lifecycle) within the
organization
• Implement cybersecurity risk assessment procedures at an early stage of
technical projects to avoid events or circumstances that could compromise the
confidentiality, inte grity, and availability of information and technology
assets, including, in particular, the identification of information and
technology assets in technology projects, potential exposure to threats, and
relevant vulnerabilities.
• Remediate all cybersecurity risks in accordance with the approved
cybersecurity risk management methodology.
Expected deliverables
• A report that outlines the identification, assessment, and remediation of
cybersecurity risks throughout the technical project lifecycle in the
organization
1-5-3-2 Before making major changes to technology infrastructure.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Include cybersecurity requirements within the IT Change Management
lifecycle in the organization
• Implement cybersecurity risk assessment procedures before making a material
change in the technology architecture to avoid events or circumstances that
could compromise the confidentiality, integrity, and availability of
information and technology assets, including, in particular, the identification
of information and technology assets in technology projects, potential
exposure to threats, and relevant vulnerabilities . These changes include, but
are not limited to: a basic and sensitive update to one or several systems in the
network, such as database systems, or a radical change in network mapping
• Remediate all cybersecurity risks in accordance with the approved
cybersecurity risk management methodology
Expected deliverables
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 22,
"page_label": "23",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
24 Document Classification: Public TLP: White
• A report that outlines the identification, assessment, and remediation of the
cybersecurity risks of material changes to the production environment of the
organization's information and technology assets
1-5-3-3 During the planning phase of obtaining third party services.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Include cybersecurity requirements within the third -party, contracts, and
procurement management procedures in the organization
• Implement cybersecu rity risk assessment procedures when planning to
acquire services from a third party. to avoid events or circumstances that could
compromise the confidentiality, integrity, and availability of information and
technology assets, including, in particular, th e identification of information
and technology assets in technology projects, potential exposure to threat s,
and relevant vulnerabilities
• Remediate all cybersecurity risks in accordance with the approved
cybersecurity risk management methodology.
Expected deliverables
• A report that outlines the identification, assessment, and remediation of third-
party cybersecurity risks that provide outsourcing services to IT or managed
services
1-5-3-4 During the planning phase and before going live for new technology
services and products.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Include cybersecurity requirements within the Release Management
procedures in the organization
• Implement cybersecurity risk assessment procedures at the planning stage and
before the release of new technology products and services to avoid events or
circumstances that could compromise the confidentiality, integrity, and
availability of information and technology assets, including, in particular, the
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 23,
"page_label": "24",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
25 Document Classification: Public TLP: White
identification of information and technology assets in technology projects,
potential exposure to threats, and relevant vulnerabilities.
• Remediate all cybersecurity risks in accordance with the approved
cybersecurity risk management methodology.
Expected deliverables
• A report that outlines the identification, assessment, and remediation of
cybersecurity risks in the planning stage and before releasing new technical
products and services in the production environment
1-5-4 The cybersecurity risk management methodology and procedures must be reviewed
periodically according to planned intervals or upon changes to related laws and
regulations. Changes and reviews must be approved and documented.
Control implementation guidelines
• Review and update the cybersecurity risk management methodology and
procedures and cybersecurity risk management requirements in the
organization periodically according to a documented and approved plan for
review and based on a planned interval ( e.g., periodic review must be
conducted annually)
• Review and update the cybersecurity risk management methodology and
procedures and cybersecurity risk management requirements in the
organization in the event of changes in the relevant laws and regulations (for
example, when a new cybersecurity law is issued that applies to the
organization)
• Document the review and changes to the cybersecurity requirements related
to cybersecurity risk management methodology an d procedures and approve
them by the representative
Expected deliverables
• An approved document that defines the review schedule for the cybersecurity
risk management methodology and procedures
• Cybersecurity risk methodology and procedures indicating that they have
been reviewed and updated, and that changes have been documented and
approved by the representative
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 24,
"page_label": "25",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-6 Cybersecurity in Information and Technology Project Management
Objective
To ensure that cybersecurity requirements are included in project management
methodology and procedures in order to protect the confidentiality, integrity and
availability of information and technology assets as per organization policies and
procedures, and related laws and regulations.
Controls
1-6-1 Cybersecurity requirements must be included in project and asset (information/
technology) change management methodology and procedures to identify and
manage cybersecurity risks as part of project management lifecycle. The cybersecurity
requirements must be a key part of the overall requirements of technology projects.
Relevant cybersecurity tools
• Secure Software Development Cycle Policy Template.
• Secure Software Development Cycle Procedure Template.
Control implementation guidelines:
• Include cybersecurity requirements in the project management methodology
and procedures and in the change management of the information and
technology assets in the organization to ensure that cybersecurity risks are
identified and addressed. Such requirements include
o Assess and detect vulnerabilities before the deployment of services or
systems online, or upon any change to systems within Information
and Technology Project Management
o Fix identified vulnerabilities before launching projects and changes
o Review Secure Configuration and Hardening and Patching and
address observations identified before launching projects and changes
o Define the requirements for connection with cyber surveillance
systems
• Support cybersecurity requirements of the project management methodology
and procedures by the Executive Management through the approval of the
head of the organization or his/ her deputy
Expected deliverables
• Project Management Methodology Document in the organization
• Change management methodology or procedures in the organization's
information and technology assets document
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 25,
"page_label": "26",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
27 Document Classification: Public TLP: White
1-6-2 The cybersecurity requirements in project and assets (information/technology)
change management must include at least the following:
1-6-2-1 Vulnerability assessment and remediation
Control implementation guidelines:
• Define and document the requirements of this control in the cybersecurity
requirements document and approve them by the representative
• Define systems, services, and technology components subject to
Vulnerabilities Assessment within the scope of technical projects and change
requests
• Develop and adopt procedures for the implementation of Vulnerabilities
Assessment and remediation in accordance with related laws and regulations
• Conduct Vulnerabilities Assessment before launching technical projects in the
production environment and assess it in a timely manner and address it
effectively.
• Conduct Vulnerabilities Assessment before the implementation of changes to
the production environment and assess it in a timely manner and address it
effectively.
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• A report that outlines the assessment and remediation of cybersecurity
vulnerabilities throughout the technical project lifecycle and changes to
information and technology assets
1-6-2-2
Conducting a configurations ’ review, secure configuration and
hardening and patching before changes or going live for technology
projects.
Relevant cybersecurity tools
• Cybersecurity Requirements Checklist Template for Project Management and
Changes to Information and Technology Assets.
• Cybersecurity Requirements Checklist Template for Application
Development.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 26,
"page_label": "27",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
28 Document Classification: Public TLP: White
• Define systems, services, and technology components subject to Secure
Configuration and Hardening review within the scope of technical projects
and change requests
• Provide technical Security Standard controls for systems, services, and
technology components subject to Secure Configuration and Hardening
review
• Develop and adopt procedures for the implementation of Secure
Configuration and Hardening review in accordance with the relevant laws and
regulations
• Review secure Configuration and Hardening and Patching before launching
technology projects in the production environment
• Review secure Configuration and Hardening and Patching before
implementing changes to the production environment
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• Technical Security Standard controls for systems, services, and technology
components subject to Secure Configuration and Hardening review
• A report that outlines the assessment and review of Secure Configuration and
Hardening throughout the technical project lifecycle and changes to
information and technology assets in the organization before launching
projects and implementing changes
1-6-3 The cybersecurity requirements related to software and application development
projects must include at least the following:
1-6-3-1 Using secure coding standards.
Relevant cybersecurity tools
• Secure Coding Standard Template.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Define and document technical cybersecurity requirements for Secure Coding
Standard controls (covering all phases of the secure coding process) based on
relevant laws and regulations, best practices and standard controls related to
the development and protection of software and applications against internal
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 27,
"page_label": "28",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
29 Document Classification: Public TLP: White
and external threats in the organization to minimize cyber risks and focus on
key security objectives namely; confidentiality, integrity, and availability
• Communicate Secure Coding Standard controls to the relevant departments
in the organization ( e.g., IT department) and their implementation
periodically
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• Secure Coding Standard controls approved by the organization
• Documents that confirm the implementation of Secure Coding Standard
controls to information and technology assets
1-6-3-2 Using trusted and licensed sources for software development tools and
libraries.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Use only modern, reliable and licensed sources for software development tools
and libraries
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• An updated list of licensed and documented software used for application
development tools and libraries
1-6-3-3 Conducting compliance test for software against the defined
organizational cybersecurity requirements.
Relevant cybersecurity tools
• Cybersecurity Requirements Checklist Template for Application
Development.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Conduct testing to verify that applications meet the cybersecurity
requirements of the organizations, such as penetration te sting, to ensure that
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 28,
"page_label": "29",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
30 Document Classification: Public TLP: White
cybersecurity controls are applied to the development of secure coding
standard controls and detect weaknesses, vulnerabilities, and issues in
software
• Access Management requirements for users and review the cybersecurity
architecture
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• List of application development projects and list of security tests performed
to verify the comprehensiveness of the tests and the extent to which the
applications meet the organization's cybersecurity requirements and
implementation reports
1-6-3-4 Secure integration between software components.
Control implementation guidelines
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Ensure security of integration between applications by, but not limited to,
security testing of various integration technologies, including
o Perform System Integration Testing (SIT)
o Perform API testing
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• A report that outlines the testing and assessment of secure Integration
between applications based on the organization's cybersecurity requirements
and implementation reports
1-6-3-5 Conducting a configurations ’ review, secure configuration and
hardening and patching before going live for software products.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Review secure Configuration and Hardening and Patching before launching
applications and ensure their implementation in the following cases
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 29,
"page_label": "30",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
31 Document Classification: Public TLP: White
o Secure Configuration and Hardening of i nformation and technology
assets and applications must be reviewed periodically and their
implementation according to the approved technical security standard
controls must be ensured
o Secure configuration and hardening must be reviewed before
launching projects and changes in information and technology assets
o Secure Configuration and Hardening must be reviewed before
launching applications
• Approve the Image for the Secure configuration and hardening of information
and technology assets in accordance with the technical security standard
controls and kept it in a safe place
• Provide technology required to centrally manage Secure Configuration and
Hardening and ensure the automated implementation or update of Secure
Configuration and Hardening for all information and technology assets at
pre-determined regular intervals
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• Reports or evidence that Secure Configuration and Hardening and patching
are reviewed before launching applications
• Reports or evidence that Secure Configuration and Hardening and patching
are periodically reviewed
1-6-4 The cybersecurity requirements in project management must be reviewed
periodically.
Control implementation guidelines
• Review the cybersecurity project management requirements periodically
according to a documented and approved plan for review and based on a
planned interval (e.g., periodic review must be conducted annually)
• Document the review and changes to the cybersecurity requirements for
project management in the organization and approve them by the head of the
organization or his/her deputy
Expected deliverables
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 30,
"page_label": "31",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-7 Compliance with Cybersecurity Standard controls, Laws and Regulations
Objective To ensure
laws and regulations.
Controls
1-7-1 The organization must comply with related national cybersecurity laws and
regulations.
Relevant cybersecurity tools
• Compliance with Cybersecurity Standard controls, Laws and Regulations
Policy Template.
Control implementation guidelines:
• Work with stakeholders in the organization (i.e., legal function and
governance and compliance function) to identify, document, and periodically
update a list of national cybersecurity laws and regulations and related
the National Cybersecurity Authority (NCA) (which might include, but not
limited to, royal orders and decrees, orders issued by the Council of Ministers,
and official circulars and regulatory orders issued by the National
Cybersecurity Authority (NCA)).
• Ensure compliance with all national cybersecurity laws and regulations
requirements referred to in the previous point.
• Provide necessary technologies; to verify compliance with national
cybersecurity laws and regulations
•
national
cybersecurity laws and regulations to be submitted to t he National
Cybersecurity Authority (NCA) whenever requested.
Expected deliverables
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 31,
"page_label": "32",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-8 Periodical Cybersecurity Review and Audit
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 32,
"page_label": "33",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
34 Document Classification: Public TLP: White
Objective
To ensure that cybersecurity controls are implemented and in compliance with
organizational policies and procedures, as well as related national and international
laws, regulations and agreements.
Controls
1-8-1 Cybersecurity reviews must be conducted periodically by the cybersecurity function
in the organization to assess the compliance with the cybersecurity controls in the
organization.
Relevant cybersecurity tools
• Cybersecurity Review and Audit Template.
• Cybersecurity Review and Audit Log Template.
Control implementation guidelines:
• Review the implementation of cybersecurity requirements at the organization
by the cybersecurity function periodically according to a documented and
approved plan for review and based on a period specified in the policy ( e.g.,
quarterly review), to ensure that the cybersecurity controls of the organization
are effectively implemented and operate in accordance with the regulatory
policies and procedures of the organization, the national laws and regulations,
and the international requirements approved by the organization
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• Approved plan to review the implementation of cybersecurity controls
• Documents that confirm the implementation of Cybersecurity Standard
controls to information, technology, and physical assets
• Periodic review reports of cybersecurity controls implementation in the
organization
1-8-2 Cybersecurity audits and reviews must be conducted by independent parties outside
the cybersecurity function (e.g., Internal Audit function) to assess the compliance
with the cybersecurity controls in the organization. Audits and reviews must be
conducted independently, while ensuring that this does not result in a conflict of
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 33,
"page_label": "34",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
35 Document Classification: Public TLP: White
interest, as per the Generally Accepted Auditing Standard controls (GAAS), and
related laws and regulations.
Relevant cybersecurity tools
• Cybersecurity Review and Audit Template.
• Cybersecurity Review and Audit Log Template.
Control implementation guidelines:
• Review and audit cybersecurity controls implementation at the organization
by parties independent of the cybersecurity function, such as the internal audit
department, or by third parties that cooperated with independently from the
relevant cybersecurity function to achieve the principle of non -conflict of
interests when reviewing the implementation of all cybersecurity
requirements in the organization
• Perform the review periodically according to a documented and approved
plan for review and based on a period specified in the policy (e.g., review must
be conducted annually), in order to ensure that the organization's
cybersecurity controls are effectively implemented and operate in accordance
with the regulatory policies and procedures of the organization, the national
laws and regulations approved by NCA, and the international requirements
approved by the organization
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• Approved plan to review and audit the implementation of cybersecurity
controls
• Audit reports (by the internal audit department or an independent external
auditor) on all cybersecurity requirements of the organization
1-8-3 Results from the cybersecurity audits and reviews must be documented and presented
to the cybersecurity steering committee and Authorizing Official. Results must
include the audit/review scope, observations, recommendations and remediation
plans.
Relevant cybersecurity tools
• Cybersecurity Review Report Template.
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 34,
"page_label": "35",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-9 Cybersecurity in Human Resources
Objective
To ensure that cybersecurity risks and requirements related to personnel (employees
and contractors) are managed efficiently prior to employment, during employment
and after termination/separation as per organizational policies and procedures, and
related laws and regulations.
Controls
1-9-1 Personnel cybersecurity requirements (prior to employment, during employment and
after termination/separation) must be defined, documented and approved.
Relevant cybersecurity tools
• Human Resources Cybersecurity Policy Template
Control implementation guidelines:
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 35,
"page_label": "36",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
37 Document Classification: Public TLP: White
• Define and document personnel cybersecurity requirements in the
cybersecurity requirements document and approved by the representativ e
Requirements include, but are not limited to
o Include cybersecurity responsibilities and non -disclosure clauses in
the contracts of employees in the organization (to cover the periods
during and after the end/termination of the job relationship with the
organization)
o Conduct screening or vetting for the personnel of cybersecurity
functions, technical functions with privileged access, and critical
systems functions
• Ensure the comprehensiveness of the cybersecurity requirements related to
employees during the employee's lifecycle in the organization, i ncluding the
following requirements
o Cybersecurity requirements prior to recruitment
o Cybersecurity requirements during work
o Cybersecurity requirements upon completion or termination of work
• Support the organization's policy by the Executive Management
This must be
done through the approval of the organization head or his/ her deputy
Expected deliverables
• Cybersecurity policy for human resources approved by the representative
1-9-2 The personnel cybersecurity requirements must be implemented.
Control implementation guidelines:
• Implement all personnel -related cybersecurity requirements that have been
identified, documented and approved in the Human Resources Cybersecurity
Policy
• Develop an action plan to implement cybersecurity requirements related to
the personnel of the organization
• Include personnel cybersecurity requirements in the organization's HR
procedures to ensure compliance with cybersecurity requirements for all
internal and external stakeholders
Expected deliverables
• Documents that confirm the implementation of cybersecurity requirements
related to personnel as documented in the HR Cybersecurity Policy
• Cybersecurity Function Personnel Contract Forms (signed copy)
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 36,
"page_label": "37",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
38 Document Classification: Public TLP: White
• Screening or vetting requests for the personnel of cybersecurity functions and
technical functions with privileged access
1-9-3 The personnel cybersecurity requirements prior to employment must include at least
the following:
1-9-3-1
Inclusion of personnel cybersecurity responsibilities and non -disclosure
clauses (covering the cybersecurity requirements during employment and
after termination/ separation) in employment contracts.
Relevant cybersecurity tools
• Acknowledgment and confidentiality templates
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Work with relevant departments to include cybersecurity responsibilities and
non-disclosure clauses in the contracts of employees in the organization (to
cover the periods during and after the end/termination of the job relationship
with the organization)
• Include such requirements in the organization's HR procedures to ensure
compliance with cybersecurity requirements for all internal and external
stakeholders
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• Organization personnel contract forms (signed copy)
• Cybersecurity Function Personnel Contract Forms (signed copy)
1-9-3-2 Screening or vetting candidates of cybersecurity and critical/privileged
positions.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Work with relevant departments to ensure Screening or Vetting of all
employees in cybersecurity functions
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 37,
"page_label": "38",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
39 Document Classification: Public TLP: White
• Work with relevant departments to ensure the Screening or Vetting of all
employees working in technical functions with privileged access, including
database management personnel, firewall management personnel, and
systems management personnel
• Include such requirements in the organization's HR procedures to ensure
compliance with cybersecurity requirements for all internal and external
stakeholders
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• Evidence that the Screening or Vetting of employees working in cybersecurity
functions and technical functions with privileged access was performed,
including but not limited to
o An official document from the relevant authorities indicating the
performance of Screening or Vetting
1-9-4 The personnel cybersecurity requirements during employment must include at least
the following:
1-9-4-1 Cybersecurity awareness (during on-boarding and during employment).
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Work with relevant departments to provide cybersecurity awareness at the
beginning and during work through the organization's approved
communication channels
• Include such requirem ents in the organization's HR procedures to ensure
compliance with cybersecurity requirements for all internal and external
stakeholders
• Support the organization's policy by the Executive Management
This must be
done through the approval of the representative
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 38,
"page_label": "39",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
40 Document Classification: Public TLP: White
• Documents that confirm the provision of awareness content to employees in
cybersecurity before work at the organization and providing them with access
through e-mails, workshops, or any other means, including but not limited to
o Review cybersecurity awareness messages shared with employees
through emails
o Review of content presented in the workshop
o Review the cybersecurity awareness plan
1-9-4-2 Implementation of and compliance with the cybersecurity requirements
as per the organizational cybersecurity policies and procedures.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Inform all employees of the organization and obtain their approval on the
cybersecurity policies and procedures, in order to educate the organization's
employees of the importance of their role in implementing the cybersecurity
requirements
• Include personnel cybersecurity requirements in the organization's HR
procedures to ensure compliance with cybersecurity requirements for all
internal and external stakeholders
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control.
• An acknowledgment form for approving cybersecurity policies by one of the
organization's employees (signed copy)
1-9-5 Personnel access to information and technology assets must be reviewed and removed
immediately upon termination/separation.
Control implementation guidelines
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Review access of employees and revoke it immediately after the
end/termination of their professional service at the organization, which may
include the following
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 39,
"page_label": "40",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
1-10 Cybersecurity Awareness and Training Program
Objective
To ensure that personnel are aware of their cybersecurity responsibilities and have
the essential cybersecurity awareness. It is also to ensure that personnel are provided
with the required cybersecurity training, skills and credentials needed to accomplish
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 40,
"page_label": "41",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
42 Document Classification: Public TLP: White
technology assets.
Controls
1-10-1 A cybersecurity awareness program must be developed and approved. The program
must be conducted periodically through multiple channels to strengthen the
awareness about cybersecurity, cyber threats and risks, and to build a positive
cybersecurity awareness culture.
Relevant cybersecurity tools
• Awareness program template.
• Awareness content template for all employees.
• Awareness content form for supervisory and executive positions.
• Information and Technology Assets Operators Awareness Content Form.
Control implementation guidelines:
• Develop and approve cybersecurit y awareness program and plan in the
organization through multiple channels periodically, including but not
limited to
o Awareness emails.
o Cybersecurity awareness workshops
o Distribution of awareness publications
o Awareness presentation through billboards
o Launch of a cybersecurity training and awareness platform
• The program may include a plan to coordinate with the Human Resources
department, the Media and Internal Communications department, and the
cybersecurity function to raise awareness of cybersecurity, its threats and risks,
and build a positive cybersecurity culture
• The organization's program must be supported by the Executive Management
This must be done through the approval of the representative.
Expected deliverables
• The awareness program document approved by the organization
1-10-2 The cybersecurity awareness program must be implemented.
Control implementation guidelines:
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 41,
"page_label": "42",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
43 Document Classification: Public TLP: White
• Implement the approved cybersecurity awareness and training program in
coordination with the cybersecurity awareness and training department,
which may include the following
o Implement the approved cybersecurity awareness program in the
organization, including but not limited to sending awareness emails
or conducting cybersecurity awareness workshops
o Evaluate cybersecurity awareness of all personnel and define and
address cybersecurity weaknesses
Expected deliverables
• Action plan to implement the cybersecurity awareness program adopted by
the organization
• Awareness programs to be shared with employees
• List of beneficiaries of awareness programs
1-10-3 The cybersecurity awareness program must cover the latest cyber threats and how to
protect against them, and must include at least the following subjects:
1-10-3-1 Secure handling of email services, especially phishing emails.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Provide cybersecurity awareness programs that cover the safe handling of e -
mail services, especially with emails and social engineering
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• Action plan to implement the cybersecurity awareness program adopted by
the organization
• Evidence of providing awareness content for the safe handling of e -mail
services, especially with phishing emails
1-10-3-2 Secure handling of mobile devices and storage media.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 42,
"page_label": "43",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
44 Document Classification: Public TLP: White
• Provide cybersecurity awareness programs to cover the safe handling of
mobile devices and storage media
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• Action plan to implement the cybersecurity awareness program adopted by
the organization
• Evidence that awareness content is provided for the safe handling of mobile
devices and storage media
1-10-3-3 Secure Internet browsing.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Provide cybersecurity awareness programs that cover the safe handling of
internet browsing services, especially dealing with suspicious websites such as
phantom phishing sites and suspicious websites and links
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• Action plan to implement the cybersecurity awareness program adopted by
the organization
• Evidence that awareness content is provided for the secure handling of
internet browsing services
1-10-3-4 Secure use of social media.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Provide cybersecurity awareness programs that cover the safe handling of
social media
Expected deliverables
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 43,
"page_label": "44",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
45 Document Classification: Public TLP: White
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• Action plan to implement the cybersecurity awareness program adopted by
the organization
• Evidence that awareness content is provided for safe handling of social media
1-10-4 Essential and customized (i.e., tailored to job functions as it relates to cybersecurity)
training and access to professional skillsets must be made available to personnel
working directly on tasks related to cybersecurity including:
1-10-4-1
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Develop and implement an approved cybersecurity training plan for
employees of the cybersecurity function in coordination with the training
department in the organization, which may include the following
o Implement the cybersecurity training plan for the organization in
coordination with the Training and Employee Development
Department
o Assist in the establishment of cybersecurity career paths to allow career
progression, deliberate development, and growth within and between
cybersecurity career fields
o Support in advocating for adequate funding for cybersecurity training
resources, to include both internal and industry -provided courses,
instructors, and related materials
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• Approved training plans and programs for the cybersecurity department
employees at the organization
• Cybersecurity training certificates
1-10-4-2 Personnel working on software/application development. and
information and technology assets operations.
Control implementation guidelines:
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 44,
"page_label": "45",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
46 Document Classification: Public TLP: White
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Develop and implement an approved training plan in the field of secure
program and application development, and the safe management of the
organization's information and technology assets for relevant employees in
coordination with the training department in the organization. This may
include the following
o Training plan to develop programs, applications and employees
operating the organization's information and technology assets must
be implemented in coordination with Training and Employee
Development Department
o Assistance in defining career paths for software and application
developers and the employees operating the organization's
information and technology assets must be provided to allow for
professional growth and upgrades in professional areas related to
software development
• Provide support in requesting the adequate funding of training resources
related to the development of programs, applications and employees operating
the organization's information and technology assets, including internal and
sector-related courses, trainers and related materials
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• Approved training programs for employees involved in the development of
programs, applications, and employees operating the organization's
information and technology assets
• Training certificates in software and application development
1-10-4-3 Executive and supervisory positions.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Develop and implement an approved cybersecurity training plan for
employees of the cybersecurity Supervisory and executive functions in
coordination with the training department in the organization, which may
include the following
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 45,
"page_label": "46",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
47 Document Classification: Public TLP: White
o Awareness of the importance of cybersecurity, developing the
cybersecurity culture and the key risks and threats, such as phishing
emails for supervisory and executive positions (Whale phishing) must
be conducted
o Training plan for supervisory and executive positi ons in the
organization must be implemented in coordination with the Training
and Employee Development Department
o Assistance in the establishment of cybersecurity career paths to allow
career progression, deliberate development, and growth within and
between cybersecurity career fields must be provided
o Support in advocating for adequate funding for cybersecurity training
resources, including both internal and industry -provided courses,
instructors, and related materials must be provided
Expected deliverables
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• Security training programs dedicated to supervisory and executive positions
in the organization
• Training certificates in supervisory and executive positions
1-10-5 The implementation of the cybersecurity awareness program must be reviewed
periodically.
Control implementation guidelines:
• Review the cybersecurity requirements of cybersecurity awareness and
training programs by conducting a periodic assessment (according to a
documented and approved plan for review and based on a planned interval
(e.g., quarterly) ) to implement awareness and training plans by the
Cybersecurity function and in cooperation with relevant departments (such
as the Awareness and Training Department)
• Conduct application review through traditional channels ( e.g., email) or
automated channels using a compliance management system
The
organization may develop a review plan explaining the cybersecurity
requirements implementation review schedule for cybersecurity awareness
and training programs
Expected deliverables
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 46,
"page_label": "47",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
48 Document Classification: Public TLP: White
• Results of cybersecurity awareness program implementation review in the
organization
• A document that defines the cybersecurity awareness and training
implementation review cycle (Compliance Assessment Schedule)
• Compliance assessment report that shows the assessment of the
implementation of cybersecurity requirements for cybersecurity awareness
and training programs
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 47,
"page_label": "48",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-1 Asset Management
Objective
To ensure that the organization has an accurate and detailed inventory of information
operational requirements to maintain the confidentiality, integrity and availability of
information and technology assets.
Controls
2-1-1
Cybersecurity requirements for managing information and technology assets must be
defined, documented and approved.
Relevant cybersecurity tools
• Asset Management Policy Template.
Control implementation guidelines:
• Develop and document cybersecurity requirements for information and
technology assets management in the organization, including the following
o The cybersecurity requirements for types and description of information
and technology asset management must be identified
o Information and technology asset classification levels requirements in
terms of data included and processed, and the criticality of the technology
asset from a cybersecurity perspective must be defined
o Requirements for the d efined stages of the information and technology
assets life cycle ( including but not limited to: preservation, processing,
storage, destruction, etc.) must be defined
o Roles and responsibilities requirements for the ownership and
management of information and technology assets must be defined
• Support the organization's developed requirements by the Executive
Management
This must be done through the approval of the representative
Expected deliverables
2
Cybersecurity Defense
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 48,
"page_label": "49",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
50 Document Classification: Public TLP: White
• Information asset management cybersecurity requirements (in form of policy
or standard) approved by the organization (e.g., electronic copy or official hard
copy)
• Formal approval by the head of the organization or his/her deputy on the
requirements (e.g., via the organization's official e -mail, paper or electronic
signature)
2-1-2 The cybersecurity requirements for managing information and technology assets must
be implemented.
Control implementation guidelines:
• All cybersecurity requirements to manage information and technology assets
of the organization, which may include the following
o Approved cybersecurity requirements for the management of information
and technology assets in the organization must be implemented, including
but not limited to, classifying all information and technology assets of the
organization, documenting and approving them in an approved and
official document ( e.g., a documented record for the management of the
organization's information and technology assets), as well as encoding all
information and technology assets of the organization based on the
approved classification of the organization's information and technology
assets
o Specific procedures for dealing with assets based on their classification and
in accordance with the relevant laws and regulations must be established.
Expected deliverables:
• Documents that confirm the implementation of cybersecurity requirements
related to information and technology asset management as documented in the
policy
• An action plan to implement the cybersecurity requirements of information
and technology assets management
• A documented and up-to-date record of all information and technology assets
(e.g., Excel spreadsheet or displayed through automated means using solutions
such as CMDB) must be provided
• Specific procedures for dealing with assets based on their classification and in
accordance with the relevant laws and regulations.
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 49,
"page_label": "50",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
51 Document Classification: Public TLP: White
2-1-3 Acceptable use policy of information and technology assets must be defined,
documented and approved.
Relevant cybersecurity tools
• Asset Acceptable Use Policy Template.
Control implementation guidelines:
• Develop acceptable use policy for information and technology assets of the
organization, which may include the following
o Set of specific regulations for access to and use of assets.
o A set of clear examples of unacceptable use.
o Consequences if defined rules of acceptable use of assets are breached
o The method used to monitor adherence to the defined rules of acceptable
use of the organization's information and technology assets
• Acceptable use policy of the organization's information and technology assets
must be communicated to all employees and stakeholders in the organization
through, including but not lim ited to the official email or through the
organization's website
• Support the organization's policy by the Executive Management
This must be
done through the approval of the organization head or his/ her deputy
Expected deliverables:
• Approved policy that covers the requirements for acceptable use of the
organization's information and technology assets ( e.g., electronic copy or
official hard copy)
• Acceptable use policy of the organization's information and technology assets
must be communicated to all employees and stakeholders in the organization
through, including but not limited to the official email or through the
organization's website. Evidence that all employees and stakeholders are aware
and informed must be provided
• Formal approval by the head of the organization or his/her deputy on the policy
(e.g., via the organization's official e-mail, paper or electronic signature)
2-1-4 Acceptable use policy of information and technology assets must be implemented.
Control implementation guidelines:
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 50,
"page_label": "51",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
52 Document Classification: Public TLP: White
• Cybersecurity policy for the acceptable use policy of the information and
technology assets of the organization must be implemented, including the
following
o Requirements for the acceptable use of information and technology assets
by the organization must be implemented, including but not limited to:
requesting each employee view and approve the Acceptable Use Policy of
information and technology assets
o These requirements must be communicated through the organizat ion's
approved communication channels to educate the organization's internal
and external stakeholders to implement these requirements
o Appropriate mechanisms and techniques must be developed to monitor
violations of the Acceptable Use Policy requirements and warn of
disciplinary actions in the event of violations
Expected deliverables:
• An action plan to implement the acceptable use requirements of information
and technology assets of the organization
• Evidence of communicating these requirements through the communication
channels approved by the organization
• A completed and approved form that clarifies the approval of the Acceptable
Use Policy by all organization's employees ( e.g., scanned physical copy, digital
platform, or official hard copy)
2-1-5
Information and technology assets must be classified, labeled and handled as per related
law and regulatory requirements.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements of information and technology assets management at the
organization and must be approved by the representative
• Work with the concerned departments to identify all information and
technology assets, including (but not limited to)
o Infrastructure (e.g., servers)
o Applications and services
o Networks (e.g., router)
o Workstations
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 51,
"page_label": "52",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
53 Document Classification: Public TLP: White
o Peripherals (e.g., printers)
o Operating systems (if any)
• Document all information and technology assets in a single register with
characteristics such as (asset name, description, owner and criticality)
• Work with asset owners to identify, document and approve asset classification
in the register in accordance with the relevant laws and regulations
• Work with the concerned departments to ensure the coding of assets based on
their classification, including but not limited to labelling the assets or
automatically coding them through modern systems
• Work with the concerned departments to ensure that asse ts are handled
according to the defined and approved classification level and based on the
approved procedures for dealing with each asset
Expected deliverables:
• A cybersecurity policy that covers the information and technology asset
management requirements of the organization (e.g., electronic copy or official
hard copy)
• Formal approval by the head of the organization or his/her deputy on the policy
(e.g., via the organization's official e-mail, paper or electronic signature)
• A document that outlines the method and system of asset classification, coding
and requirements
• An action plan to implement the requirements of classification and coding of
information and technology assets (Labelling) in accordance with the r elevant
laws and regulations.
• An up -to-date register that includes all information and technology assets,
indicating the level of classification for each asset ( e.g., Excel or through
automated means using technical solutions such as CMDB)
• Evidence that outlines that the organization's assets are classified according to
the defined and approved classification level
• Evidence that outlines that the organization's assets have been labelled
according to the classification level defined and based on but not limited to the
coding labels that demonstrate the coding of all assets within the organization
• Evidence of the implementation of controls on the organization's assets in
accordance with their classification level, including but not limited to the
procedures followed when dealing with each asset based on its classification
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 52,
"page_label": "53",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-2 Identity and Access Management
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 53,
"page_label": "54",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
55 Document Classification: Public TLP: White
Objective
To ensure the secure and restricted logical access to information and technology assets
in order to prevent unauthorized access and allow only authorized access for users
which are necessary to accomplish assigned tasks.
Controls
2-2-1 Cybersecurity requirements for identity and access management must be defined,
documented and approved.
Relevant cybersecurity tools
• Identity and Access Management Policy Template.
Control implementation guidelines:
• Develop and document cybersecurity policy for identity and access
management in the organization, which may include, but is not limited to
o Grant access, including
- Access to user accounts
- Privileged Access to accounts
- Remote access to the organization's networks and systems
- Define and approve the authority of each type of users
o Revoke and Change Access.
o Review Identity and Access
o Manage passwords
• Support the organization's policy by the Executive Management
This must be
done through the approval of the representative
Expected deliverables:
• Cybersecurity policy that covers Identity and Access Management ( e.g.,
electronic copy or official hard copy)
• Formal approval by the head of the organization or his/her deputy on the policy
(e.g., via the organization's official e-mail, paper or electronic signature)
2-2-2 The cybersecurity requirements for identity and access management must be
implemented.
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 54,
"page_label": "55",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
56 Document Classification: Public TLP: White
Control implementation guidelines:
• All cybersecurity requirements must be implemented for the organization's
approved identity and access management procedures. It is also recommended
that the identity and access management cover the following, but not limited
to
o User Authentication based on user login management.
o Password management based on the organization's password policy
o User authorization management based on a need -to-know and Need -
to-use basis.
o User authorization management based on least privilege and
Segregation of Duties
o Remote access management to the organization's networks.
o Access Cancellation and Update Management.
Expected deliverables:
• Action plan for cybersecurity requirements for Identity and Access
Management
• Evidence that the identity and access management controls must be
implemented on all technical and information assets in the organization,
including but not limited to, the configuration of all technical information
systems in line with the cybersecurity controls and requirements of identity and
access management
2-2-3 The cybersecurity requirements for identity and access management must include at
least the following
2-2-3-1 User authentication based on username and password.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements of identity and access management at the organization and must
be approved by the representative
• Ensure all employees have a unique identifier, which may be a job number,
employee name, or other naming mechanisms to ensure that usernames are
unique
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 55,
"page_label": "56",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
57 Document Classification: Public TLP: White
• Prepare password standard co ntrols taking into consideration best practices,
including but not limited to
o Expiration Period
o Complexity
o Lockout
o Activation
o Password History
o A secure mechanism to create a password and provide it to the user
Expected deliverables
• Cybersecurity policy that covers Identity and Access Management ( e.g.,
electronic copy or official hard copy)
• Password management policy in the organization ( e.g., electronic copy or
official hard copy)
• Formal approval by the head of the organization or system owner or his/her
deputy on such policies ( e.g., via the organization's official e -mail, paper or
electronic signature)
• Evidence that the identity and access management controls must be
implemented on all technical and information assets in the orga nization,
including but not limited to, the configuration of all technical information
systems in line with the cybersecurity controls and requirements of identity and
access management
2-2-3-2 Multi-factor authentication for remote access.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements of identity and access management at the organization and must
be approved by the representative
• Develop procedures for remote access with Multi-Factor Authentication
• Provide appropriate and advanced multi-factor authentication techniques and
link them to remote access technologies (e.g., VPN) must be ensured
• Use two of the following authentication elements to apply multi -factor
authentication
o Something you know, e.g., using the password
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 56,
"page_label": "57",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
58 Document Classification: Public TLP: White
o Something you have, e.g., using One time password through SMS or
applications
o Something you are, e.g., using biometrics such as fingerprint or face
recognition
Expected deliverables
• Cybersecurity policy that covers Identity and Access Management ( e.g.,
electronic copy or official hard copy)
• Formal approval by the head of the organization or his/her deputy on the policy
(e.g., via the organization's official e-mail, paper or electronic signature)
• Evidence that outlines the implementation of multi -factor authentication
requirements to remote access, including but not limited to a screenshot
showing the configuration of systems to ensure that the multi -factor
authentication request for remote access is verified
2-2-3-3 User authorization based on identity and access control principles: Need-to-
Know and Need-to-Use, Least Privilege and Segregation of Duties.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements of identity and access management at the organization and must
be approved by the representative
• Define basic authorizations for all organization's employees, such as the
authority to use email, internal portal, and human resources system
• Define and document the requirements of this ECC in the cybersecurity
requirements of identity and access management at the organization and must
be approved by the representative.
• Manage user authorization to all information and technology assets in the
organization via an automated centralized access control system such as Active
Directory
• Develop and adopt specific procedures for granting powers to employees in the
organization, as there are requirements to request authority, including
o Applicant information (identity)
o Details of the authority in question (explanation of authority and assets
involved)
o Description of Business Requirements for authorization
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 57,
"page_label": "58",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
59 Document Classification: Public TLP: White
o Time required for authorization
o Approvals required (e.g., Line Manager approval)
Expected deliverables
• Cybersecurity policy that covers Identity and Access Management ( e.g.,
electronic copy or official hard copy)
• Evidence that outlines the implementation of User authorization management
requirements, including but not limited to a screenshot showing the
configuration of systems to ensure the implementation of user authorization
management based on a Need to Know and Need to Use basis and least privilege
and Segregation of Duties
2-2-3-4 Privileged access management.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements of identity and access management at the organization and must
be approved by the representative
• Define privileged access at the level of infrastructure, networks, and
applications in the organization.
• Identify Personnel with Privileged Access.
• Develop Privileged Access Management procedures by the organization, taking
into account the following
o Privileged accounts must not be used for normal daily tasks, and a normal
user account must be used for this purpose
o Privileged accounts must not be used for internet access.
o Privileged accounts must not be used for email access
o Privileged accounts must not be restricted for remote access
o Default accounts must be disabled/ deleted.
o Workstation protection system must be installed and updated on the
workstation that will be used to access privileged accounts.
o Secure versions of operating systems used in the organization must be built
and prepared in a secure manner.
o Protection programs must be installed and unused services must be
disabled
These copies must be used to configure desktops and servers.
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 58,
"page_label": "59",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
60 Document Classification: Public TLP: White
• Define modern and advanced technologies and mechanisms for the Privileged
Access Management
• Grant privileged access based on functional duties after obtaining the necessary
approvals, taking into consideration the principle of segregation of duties
• Continuously monitor cybersecurity event logs for privileged accounts
Expected deliverables
• Privileged Access Management Policy in the organization (e.g., electronic copy
or official hard copy)
• Formal approval by the head of the organization or his/her deputy on the policy
(e.g., via the organization's official e-mail, paper or electronic signature)
• Evidence that outlines the implementation of privileged access management
requirements, including but not limited to a screenshot sh owing the
configuration of systems to ensure that administrators are granted privileged
access
2-2-3-5
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements of identity and access management at the organization and must
be approved by the representative
• Define privileged access at the level of infrastructure, networks, and applications
in the organization.
• Identify Personnel with Privileged Access.
• Develop a plan for periodic review of identity and access as follows
o Across all applications in the organization
o Network level
o Infrastructure and servers level
o Workstations level
• Review authorities in collaboration with IT department and application
managers to revoke access in the following cases (e.g., limited to)
o Access has not been used for a long period of time (e.g., over 3 months)
o Access causes conflict of interest
o The employee's need for access has not been confirmed by his manager
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 59,
"page_label": "60",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
61 Document Classification: Public TLP: White
o Expiry of the access period
Expected deliverables
• Privileged Access Management Policy in the organization (e.g., electronic copy
or official hard copy)
• Formal approval by the head of the organization or his/her deputy on the policy
(e.g., via the organization's official e-mail, paper or electronic signature)
• Evidence that outlines the implementation of periodic review requirements of
identity and access, e.g., an official and approved document that clarifies the
periodic review of the identity and access
2-2-4 The Implementation of the cybersecurity requirements for identity and access
management must be reviewed periodically.
Control implementation guidelines:
• Review the cybersecurity requirements of identity and access management by
conducting a periodic assessment (according to a documented and approved
plan for review, and based on a planned interval "e.g., quarterly") to implement
identity and access management requirements by the Cybersecurity function
and in cooperation with relevant departments (such as IT Department)
• Review and update cybersecurity requirements for identity and access
management in the organization periodically according to a documented and
approved plan for review and based on a planned interval or in the event of
changes in relevant laws and regulations
• Document the review and changes to the cybersecurity requirements for
identity and access management in the organization and approve them by the
head of the organization or his/her deputy
Expected deliverables
• Results of identity and access management requirements implementation
review in the organization
• A document that defines the cybersecurity requirements implementation
review cycle for identity and access management at the organization
(Compliance Assessment Schedule)
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 60,
"page_label": "61",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-3 Information System and Information Processing Facilities Protection
Objective To ensure the protection of information systems and information processing facilities
(including workstations and infrastructures) against cyber risks.
Controls
2-3-1 Cybersecurity requirements for protecting information systems and information
processing facilities must be defined, documented and approved.
Relevant cybersecurity tools
• Database Security Policy Template.
Control implementation guidelines:
• Develop and document cybersecurity policy for Information System and
Processing Facilities Protection in the organization, including the following
o Modern and advanced protection techniques and mechanisms,
providing them and ensuring their reliability
o Malware Protection Solution Configuration
o Scope of devices to be protected, including all workstations, critical
systems in the organization, etc
• Compliance assessment report that outlines the assessment of the
implementation of cybersecurity requirements for identity and access
management in the organization
• An approved document that sets the policy's review schedule
• Policy indicating that it has been reviewed and updated, and that changes have
been documented and approved by the head of the organization or his/her
deputy
• Formal approval by the head of the organization or his/her deputy on the
updated policy ( e.g., via the organization's official e -mail, paper or electronic
signature)
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 61,
"page_label": "62",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
63 Document Classification: Public TLP: White
o Secure copies of the operating systems used in the organization must be
built and prepared in a secure manner, protection programs must be
installed, and unused services must be disabled. Such copied must be
used in the configuration of desktops and servers
o Workstations and systems in the organization must be periodically
scanned against malware
o Use of external storage media and its security must be restricted
o Patch management for systems, applications and devices
o Central sources of time synchronization in the organization must be
defined to be from a reliable source
• Support the organization's policy by the Executive Management
This must be
done through the approval of the organization head or his/ her deputy
Expected deliverables
• Cybersecurity policy that covers the requirements of Information System and
Processing Facilities Protection at the organization ( e.g., electronic copy or
official hard copy)
• Formal approval by the head of the organization or his/her deputy on the policy
(e.g., via the organization's official e-mail, paper or electronic signature)
• Secure Configuration and Hardening Policy Template
• Server Security Policy Template
• Malware Protection Policy Template
• Storage Media Policy Template
• Patch Management Policy Template
2-3-2 The cybersecurity requirements for protecting information systems and information
processing facilities must be implemented.
Control implementation guidelines:
• Implement all cybersecurity requirements for Information System and
Processing Facilities Protection in the organization. This may include the
following
o Modern and advanced protection techniques and mechanisms'
availability and reliability must be ensured
o Scope of devices to be protected and reviewed periodica lly must be
ensured
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 62,
"page_label": "63",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
64 Document Classification: Public TLP: White
o Use of external storage media and its security must be restricted
o Patches throughout the organization's devices, systems, and applications
must be implemented
o Central Clock Synchronization and from a reliable source must be
implemented
Expected deliverables
• Documents that confirm the implementation of cybersecurity requirements
related to information systems and processing facilities as documented in the
policy
• An up-to-date list of the organization's virus protection systems and the extent
of their download
• Restrict the use of external storage media and procedures for approving their
use
• Evidence that the scope of patches covers all devices, systems and applications
• Evidence that the organization uses a central server and a reliable source for
timing synchronization
2-3-3 The cybersecurity requirements for protecting information systems and information
processing facilities must include at least the following:
2-3-3-1 Advanced, up-to-date and secure management of malware and virus
protection on servers and workstations.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Provide anti -virus, suspicious programs, and malware protection techniques
and mechanisms, including the following
o Continuously ensure that the technologies used are current and
advanced and contain protection against advanced persistent threat
(APT)
o Determine the domain of the assets on which the protection system will
be installed and identify and update their status
o Install the protection system throughout the workstations, systems and
servers of the organization
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 63,
"page_label": "64",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
65 Document Classification: Public TLP: White
o Review the protection system periodically to ensure that the scope of the
protection system is comprehensive for all workstations, systems, and
servers of the organization through the protection system's control unit
o Develop and implement a remediation action plan (when needed) to
install the protection system on all devices while taking action against
devices and systems where it is frequently observed that the modern and
advanced protection system is not installed
o Follow up on the protecti on system periodically to ensure updates are
installed and released on all workstations, systems and servers of the
organization
Expected deliverables
• Documents indicating the identification and documentation of the
requirements of this ECC in the policies or procedures of the organization
approved by the representative.
• List of antivirus systems and evidence of protection against APT (including but
not limited to a screenshot or direct example from the APT Monitoring page
of the protection system)
• Reports or evidence of installing the protection technologies across all
workstations, systems and servers of the organization
• Reports or evidence of following -up the scope of installing and periodic
updating of these technologies
2-3-3-2 Restricted use and secure handling of external storage media.
Control implementation guidelines:
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Restrict the use of external storage media by
o Groups in the privileged access management system must be created
according to authority so that the use of external storage media is
automatically not activated on all workstations, the organization's
systems, and servers
o Documented procedures must be defined to provide approval for the
use of external storage media (including but not limited to: requesting
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 64,
"page_label": "65",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
66 Document Classification: Public TLP: White
approvals via e -mail, paper, or through an internal system). Such
procedures include
- Reason for requesting approval for use
- Use start and end date.
- Mechanism for handling data stored in storage media so that it
is checked prior to use and data is erased after completion.
Expected deliverables:
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control.
• Report or evidence indicating the restriction of using external storage media
(including but not limited to a screenshot or direct example from access
management system showing the vigor restriction of the use of external storage
media on workstations and servers).
• Approval procedures for the use of storage media for part of the approved
devices.
2-3-3-3 Patch management for information systems, software and devices.
Control implementation guidelines
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative.
• Define procedures for patch management for systems, devices and applications,
which include:
o The scope of systems where patches are implemented must be defined
to include:
- Workstations
- Operating Systems
- Network Devices
- Databases
- Applications
o Time period required to implement patches must be defined according
to the quality of operating system, the system criticality, applicable
patches, and importance of patches.
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 65,
"page_label": "66",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
67 Document Classification: Public TLP: White
o Patches procedures must be included in change management
methodology or change ma nagement must be included into patch
management policy.
o Change management approval must be included as part of patch
approval form for all systems, devices and applications, including but
not limited to: requesting approvals via e -mail, paper, or through a n
internal system.
o Patches must be implemented to the defined scope after obtaining the
necessary approval.
o Implementation of patches must be continuously reviewed to ensure
that all necessary patches are implemented to all devices, systems, and
applications.
o Required patches must be periodically monitored to ensure patches by,
but not limited to, the protection system, patch management system,
and vulnerability alerts sent by email.
Expected deliverables:
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control.
• Evidence indicating the inclusion of change management in patches (including
but not limited to: including patches in change management methodology or
enforcing change management by including it in the requirements of Patch
Management).
• Approval procedures indicate that change management approval is required
for patches.
• Reports or evidence that the scope of patches covers all devices, systems and
applications.
• Reports or evidence that the patches are performed according to the period
specified in the procedures (including but not limited to: a screenshot or direct
example that displays the date and scope for several samples of patches
approved by e-mail, internal system or paper that are performed in advance to
include all the organization's devices, systems and applications periodically).
2-3-3-4 Centralized clock synchronization with an accurate and trusted source (e.g.,
Saudi Standard controls, Metrology and Quality Organization (SASO)).
Control implementation guidelines
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 66,
"page_label": "67",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
68 Document Classification: Public TLP: White
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative.
• Perform time synchronization through the organization's central server NTP.
• Configure central server time to synchronize with, but not limited to, one of the
following reliable sources:
o Saudi Standard controls , Metrology and Quality Organization
(time.saso.gov.sa).
o King Abdulaziz City for Science and Technology
(KACST)(time.isu.net.sa).
Expected deliverables:
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control.
• Evidence that the organization uses a central server to synchronize timing
(including but not limited to: a screenshot or direct example of the presence of
this server in the network with all server details)
• Evidence of using a reliable and accurate source (including but not limited to:
a screenshot or direct example of the configuration of this server that proves
the use of the SASO source or others).
2-3-4 The cybersecurity requirements for protecting information systems and information
processing facilities must be reviewed periodically.
Control implementation guidelines
• Review the cybersecurity requirements for Information System and Processing
Facilities Protection in the organization periodically according to a documented
and approved plan for review and based on a planned interval ( e.g., periodic
review must be conducted annually).
• Document the review and chan ges to the cybersecurity requirements for
Information System and Processing Facilities Protection in the organization and
approve them by the head of the organization or his/her deputy.
Expected deliverables:
• An approved document that defines the review schedule for the requirements
document.
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 67,
"page_label": "68",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
2-4 Email Protection
Objective
Controls
2-4-1 Cybersecurity requirements for protecting email service must be defined, documented
and approved.
Relevant cybersecurity tools:
• Email Security Policy Template.
Control implementation guidelines
• Develop and document cybersecurity policy for email protection in the
organization, including the following:
o Modern and advanced protection techniques and mechanisms'
availability and reliability must be ensured.
o Email Protection Solution Configuration Requirements.
o Email roles and responsibilities requirements for public and joint
accounts.
o Size of incoming and outgoing email attachments and the capacity of
the mailbox for each user.
o Secure design requirements for email infrastructure.
• Support the organization's policy by the Execut ive Management. This must be
done through the approval of the organization head or his/ her deputy.
Expected deliverables:
• Email security policy and standard document approved by the organization
(e.g., electronic copy or official hard copy).
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 68,
"page_label": "69",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
70 Document Classification: Public TLP: White
• Formal approval by the head of the organization or his/her deputy on the policy
(e.g., via the organization's official e-mail, paper or electronic signature).
2-4-2 The cybersecurity requirements for email service must be implemented.
Control implementation guidelines
• Email protection cybersecurity requirements in the organization must be
implemented, including:
o Approved cybersecurity requirements must be implemented to protect
the organization's email, including but not limited to the use of
appropriate and advanced technologies to analyze and filter emails.
o Advanced technologies must be used to protect the organization's email
from phishing emails and spam messages, including but not limited to
the presence of an official and effective subscription with email
protection service providers.
o Email access must be through an intermediary, including but not limited
to Load balancer.
Expected deliverables:
• An action plan to implement Email protection cybersecurity requirements at
the organization.
• Email protection controls in the organization must be implemented, including
but not limited to:
o Advanced email protection and filtering technologies must be used by the
organization to block suspicious messages, such as spam and phishing emails.
o Antivirus solutions must be configured to email servers in order to scan all
inbound and outbound emails.
o Email field of the organization must be documented by using necessary
means, such as the Sender Policy Framework, and reliability of incoming
mail fields must be ensured through modern technologies such as (Incoming
Message DMARC verification).
2-4-3 The cybersecurity requirements for protecting the email service must include at the
least the following:
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 69,
"page_label": "70",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
71 Document Classification: Public TLP: White
2-4-3-1 Analyzing and filtering email messages (specifically phishing emails and
spam) using advanced and up-to-date email protection techniques.
Control implementation guidelines
• Define and document the requirements of this ECC in the cybersecurity
requirements of email security at the organization and must be approved by the
representative.
• Define and provide advanced technologies to analyze and filter the
organization's emails.
• Activate analysis and filtering features in the email protection system through
the dashboard.
• Periodically review the list of suspicious emails such as phishing messages, spam
messages, etc. through the system by the specialized team to follow up email
protection.
• Add new intrusion indicators related to email in the protection system on an
ongoing basis.
Expected deliverables:
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control.
• Screenshot or direct example showing subscription and use of modern and
advanced technologies to analyze and filter emails in the organization.
• Screenshot or direct example of the configuration of email to prove the feature
of analyzing and filtering emails, including phishing emails and spam emails.
2-4-3-2 Multi-factor authentication for remote and webmail access to email service.
Control implementation guidelines
• Define and document the requirements of this ECC in the cybersecurity
requirements of email security at the organization and must be approved by the
representative.
• Activate multi -factor authentication for remote access and organization's
webmail access by, but not limited to, one of the following methods:
o Text messages linked to the email user's number must be used.
o Advanced and reliable applications for multi-factor authentication.
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 70,
"page_label": "71",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
72 Document Classification: Public TLP: White
o Mobile device management applications must be used to allow users'
devices (as another element of access) to email for protocols (such as
EWS, outlook anywhere protocols) that do not support text messages or
applications that provide verification code.
Expected deliverables:
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control.
• Screenshot or direct example of email configuration to prove the activation of
multi-factor authentication to access via the organization's email webmail.
• Screenshot or direct example that proves the use of advanced and reliable
technologies for multi-factor authentication.
2-4-3-3 Email archiving and backup.
Control implementation guidelines
• Define and document the requirements of this ECC in the cybersecurity
requirements of email security at the organization and must be approved by the
representative.
• Define technologies compatible with the organization's technical systems and
infrastructure to backup and archive the organization's email.
• Define retention period for backup and archiving of the organization's email.
• Perform backup at the level of the organization's email servers.
• Activate archiving of all email boxes of the organization.
Expected deliverables:
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control.
• Screenshot or direct example showing subscription and use of modern and
advanced technologies for backup and archiving of email, as well as the
approved capacity and duration.
• Backup reports for the organization's email servers.
• Screenshot or direct example that shows the activation of the email boxes
archiving feature.
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 71,
"page_label": "72",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 97